Bug 122735
Summary: | doxywizard; X Error: BadValue (integer parameter out of range for operation) | ||||||
---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 3 | Reporter: | Martin Jenner <mjenner> | ||||
Component: | doxygen | Assignee: | Than Ngo <than> | ||||
Status: | CLOSED WONTFIX | QA Contact: | Brian Brock <bbrock> | ||||
Severity: | medium | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | 3.0 | CC: | than | ||||
Target Milestone: | --- | ||||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2007-10-19 19:26:33 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Attachments: |
|
Description
Martin Jenner
2004-05-07 16:01:18 UTC
i don't think it's a bug in doxygenwizard, it could be a bug in qt/X library, which causes this warnig. But the warning seems harmless Created attachment 129339 [details]
debugging infos
After debugging and asking Trolltech i notice that it's a bug in XFree86 (In reply to comment #3) > After debugging and asking Trolltech i notice that it's a bug in XFree86 Can you elaborate on that? please take a look at above debug infos. >X Error: BadValue (integer parameter out of range for operation) 2
> Major opcode: 156
> Minor opcode: 4
> Resource id: 0x100
In the above, "X Error" does not indicate "An error has occured in the
X Window System", it indicates "your program has done something invalid,
and the X Window System is pointing out the flaw in your program by
throwing up an error".
This bug is filed against RHEL 3, which is in maintenance phase. During the maintenance phase, only security errata and select mission critical bug fixes will be released for enterprise products. Since this bug does not meet that criteria, it is now being closed. For more information of the RHEL errata support policy, please visit: http://www.redhat.com/security/updates/errata/ If you feel this bug is indeed mission critical, please contact your support representative. You may be asked to provide detailed information on how this bug is affecting you. |